2020
DOI: 10.1007/978-981-15-2369-4_35
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of AES, RSA and Hashing Algorithm Using Web Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Various researchers have examined the encryption capabilities of different algorithms and identified their capacity to ensure adequate encryption. Tiwari et al [21] examined the suitability of AES and RSA algorithms and noticed that they offered a high level of encryption capacity because they depend on public and private keys shared securely to reduce the risk of unauthorized viewing or modification of documents and messages. Buhari et al [24] investigated the capabilities of AES and Blowfish and found that the two algorithms offer benefits such as low execution times that can enhance user experience.…”
Section: Discussion Of Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Various researchers have examined the encryption capabilities of different algorithms and identified their capacity to ensure adequate encryption. Tiwari et al [21] examined the suitability of AES and RSA algorithms and noticed that they offered a high level of encryption capacity because they depend on public and private keys shared securely to reduce the risk of unauthorized viewing or modification of documents and messages. Buhari et al [24] investigated the capabilities of AES and Blowfish and found that the two algorithms offer benefits such as low execution times that can enhance user experience.…”
Section: Discussion Of Related Workmentioning
confidence: 99%
“…Therefore, the algorithm offers less time complexity to achieve better operation. Tiwari et al [21] AES, RSA and hashing AES algorithm takes less time to encrypt and decrypt files compared with hashing and RSA algorithms.…”
Section: Discussion Of Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It also includes communication of the wide mapping table through the unreliable channels for the decryption process. Several research studies have focused mainly on the use of AES as an encryption and decryption algorithm [ 19 ]. While the algorithm claims to perform better than other methods, it did not include concrete results for the same through a variety of security and encryption quality metrics, such as Entropy, NPCR, UACI, etc.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Thorough validation and classification efforts play a crucial role in improving cybersecurity defenses by enabling focused countermeasures against the dynamic obfuscation strategies used by contemporary malware strains. [4] We urgently need to find the fastest and safest encryption techniques available. The AES algorithm outperforms the RSA algorithm in terms of memory requirements and has a lower time complexity.…”
mentioning
confidence: 99%